UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 149
1.
  • A Survey of Provably Secure... A Survey of Provably Secure Searchable Encryption
    Bösch, Christoph; Hartel, Pieter; Jonker, Willem ... ACM computing surveys, 01/2015, Volume: 47, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key ...
Full text
2.
  • Putting the privacy paradox... Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
    Barth, Susanne; de Jong, Menno D.T.; Junger, Marianne ... Telematics and informatics, 08/2019, Volume: 41
    Journal Article
    Peer reviewed
    Open access

    •Experimental research into the ‘privacy paradox’ is still comparatively rare.•This study focuses on observing actual behavior.•Neither technical knowledge nor money prevent from paradoxical ...
Full text

PDF
3.
  • In their own words: decepti... In their own words: deception detection by victims and near victims of fraud
    Junger, Marianne; Koning, Luka; Hartel, Pieter ... Frontiers in psychology, 05/2023, Volume: 14
    Journal Article
    Peer reviewed
    Open access

    Research on deception detection has usually been executed in experimental settings in the laboratory. In contrast, the present research investigates deception detection by actual victims and near ...
Full text
4.
  • Going dark? Analysing the i... Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases
    Hartel, Pieter; van Wegberg, Rolf Crime science, 03/2023, Volume: 12, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Law enforcement agencies struggle with criminals using end-to-end encryption (E2EE). A recent policy paper states: “while encryption is vital and privacy and cyber security must be protected, that ...
Full text
5.
  • Privacy Rating: A User-Cent... Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services
    Barth, Susanne; Ionita, Dan; de Jong, Menno ... IEEE transactions on professional communication, 12/2021, Volume: 64, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Background: Many countries mandate transparency and consent when personal data are handled by online services. However, most users do not read privacy policies or cannot understand them. An important ...
Full text

PDF
6.
  • A log mining approach for p... A log mining approach for process monitoring in SCADA
    Hadžiosmanović, Dina; Bolzoni, Damiano; Hartel, Pieter H. International journal of information security, 08/2012, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    SCADA (supervisory control and data acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related ...
Full text

PDF
7.
  • An Empirical Study Into the... An Empirical Study Into the Success of Listed Smart Contracts in Ethereum
    Hartel, Pieter; Homoliak, Ivan; Reijsbergen, Daniel IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Since it takes time and effort to put a new product or service on the market, one would like to predict whether it will be a success. In general this is not possible, but it is possible to follow ...
Full text

PDF
8.
Full text
9.
  • The persuasion and security... The persuasion and security awareness experiment: reducing the success of social engineering attacks
    Bullée, Jan-Willem H.; Montoya, Lorena; Pieters, Wolter ... Journal of experimental criminology, 03/2015, Volume: 11, Issue: 1
    Journal Article
    Peer reviewed

    Objectives The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g., the obtaining of access via persuasion) in an office environment. ...
Full text
10.
  • Understanding Online Privac... Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines
    Barth, Susanne; Ionita, Dan; Hartel, Pieter ACM computing surveys, 02/2022, Volume: 55, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Privacy visualizations help users understand the privacy implications of using an online service. Privacy by Design guidelines provide generally accepted privacy standards for developers of online ...
Full text

PDF
1 2 3 4 5
hits: 149

Load filters